Tags: security* + paper*

17 bookmark(s) - Sort by: Date / Title ↑ /

  1. "breaking 104 bit wep in less than 60 seconds", erik tews, ralf-philipp weinmann and andrei pyshkin.
    Tags: , , , , by Andreas Turtschan and 1 other (2007-04-09)
  2. Reprinted from: CACM 27/8, pp. 761-763 » .
  3. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng.
    Tags: , , , by Andreas Turtschan and 1 other (2008-04-24)
  4. Bypassing Browser Memory Protections. Setting back browser security by 10 years. Alexander Sotirov, Mark Dowd.
    Tags: , by Andreas Turtschan (2008-08-10)
  5. 0-Day Patch Exposing Vendors (In)security Performance. Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner.
    Tags: , by Andreas Turtschan (2008-03-28)
  6. using cpu system management mode to circumvent operating system security functions. loïc duflot, daniel etiemble, olivier grumelard.
  7. Thirty Years Later: Lessons from the Multics Security Evaluation. Paul A. Karger, Roger R. Schell.
    Tags: , , by Andreas Turtschan (2007-11-16)
  8. Dorrendorf, Gutterman and Pinkas have reverse engineered the random number generator code from Windows. According to their paper, it is easy (O(1)) to compute a previous random number and possible (O(2^23) to predict the next one. (via The Inquirer)
  9. Cryptanalytic Attacks on Pseudorandom Number Generators. J. Kelsey, B. Schneier, D. Wagner, and C. Hall.
    Tags: , , , by Andreas Turtschan (2007-11-16)

Top of the page

First / Previous / Next / Last / Page 1 of 2 Bookmarks: tagged with "security+paper"

About - Propulsed by SemanticScuttle